[nsp-sec] Strong Increase in port 1433/tcp
Smith, Donald
Donald.Smith at qwest.com
Mon Mar 2 18:00:44 EST 2009
77.87.97.8 is my top hitter.
I look at just his netflow and watched him hit 129.219.x.y where x and y appear to be pseudo-random not sequential scans.
Syns are all 48 byte. The ack's comming from 77.87.97.8 are in the 200-228 bytes (including ethernet header). I suspect the is an exploit given the fairly fixed size.
(coffee != sleep) & (!coffee == sleep)
Donald.Smith at qwest.com gcia
> -----Original Message-----
> From: Yiming Gong [mailto:yiming.gong at xo.com]
> Sent: Monday, March 02, 2009 3:19 PM
> To: Smith, Donald
> Cc: 'nsp-security at puck.nether.net'
> Subject: Re: [nsp-sec] Strong Increase in port 1433/tcp
>
> for the past 48 hours, I got 10323 unique IPs scanning port 1434
> +---------------------+
> | count(distinct sip) |
> +---------------------+
> | 10323 |
> +---------------------+
> 1 row in set (6.83 sec)
>
> and of them, only 64 of these unique IPs were using src port
> 6000, here
> is the top 10 src ports ordered by the total number of distinct sip.
>
> +-------+---------------------+
> | sport | count(distinct sip) |
> +-------+---------------------+
> | 6000 | 64 |
> | 4103 | 14 |
> | 3786 | 13 |
> | 4421 | 13 |
> | 3517 | 12 |
> | 3848 | 12 |
> | 4784 | 12 |
> | 3541 | 11 |
> | 3588 | 11 |
> | 3604 | 11 |
> +-------+---------------------+
> 10 rows in set (7.70 sec)
>
> Regards!
>
> Yiming
>
> Smith, Donald wrote:
> > ----------- nsp-security Confidential --------
> >
> > That should be sql not swl:)
> > And I think dasher is the constant since that has been
> around a LONG time.
> > Can someone that saw this in their darknet validate that
> the increase is caused by the non-6000-1433 traffic?
> >
> >
> > (coffee != sleep) & (!coffee == sleep)
> > Donald.Smith at qwest.com gcia
> >
> >> -----Original Message-----
> >> From: nsp-security-bounces at puck.nether.net
> >> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of
> >> Smith, Donald
> >> Sent: Monday, March 02, 2009 1:18 PM
> >> To: 'Klaus Moeller'; 'nsp-security at puck.nether.net'
> >> Subject: Re: [nsp-sec] Strong Increase in port 1433/tcp
> >>
> >> ----------- nsp-security Confidential --------
> >>
> >> Is ~1/2 of it all coming from or going to tcp port 6000?
> >>
> >>
> >> more /tmp/1433.03-02.ips | awk '{ if(($5==6000) || ($8==6000)
> >> )print $8}' |wc -l
> >> 458159
> >> wc -l /tmp/1433.03-02.ips
> >> 845859
> >>
> >> Count source port:
> >> Sourced from 6000
> >> 442043 6000
> >> 19026 80
> >> 1784 443
> >>
> >> Destined to 6000
> >> 16116 6000
> >> 12539 80
> >> 1874 443
> >> 624 3759
> >>
> >> Mostly syn scanning.
> >>
> >> This shows 324 non syn packets sourced from 6000 destined to 1433.
> >>
> >> /tmp/1433.03-02.ips | awk '{ if(($5==6000) && ($10!=2) )print
> >> $8}' | wc -l
> >> 324
> >>
> >> So what are those? They are all resets.
> >> w32.dasher used 6000 as a source port and attempted to
> >> exploit an microsoft swl server vulnerability.
> >>
> >> http://vil.mcafeesecurity.com/vil/content/v_137567.htm
> >>
> >> Note that your two pictures show a huge increase in source
> >> ips not destination ips.
> >> The sans shows targets stayed about the same.
> >>
> >> So is this an outbreak of dasher or is dasher the old noise
> >> and this is something new?
> >>
> >>
> >> (coffee != sleep) & (!coffee == sleep)
> >> Donald.Smith at qwest.com gcia
> >>
> >>> -----Original Message-----
> >>> From: nsp-security-bounces at puck.nether.net
> >>> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of
> >>> Klaus Moeller
> >>> Sent: Monday, March 02, 2009 9:42 AM
> >>> To: nsp-security at puck.nether.net
> >>> Subject: [nsp-sec] Strong Increase in port 1433/tcp
> >>>
> >>> ----------- nsp-security Confidential --------
> >>>
> >>>
> >>
> >> _______________________________________________
> >> nsp-security mailing list
> >> nsp-security at puck.nether.net
> >> https://puck.nether.net/mailman/listinfo/nsp-security
> >>
> >> Please do not Forward, CC, or BCC this E-mail outside of the
> >> nsp-security
> >> community. Confidentiality is essential for effective
> >> Internet security counter-measures.
> >> _______________________________________________
> >>
> >
> >
> > _______________________________________________
> > nsp-security mailing list
> > nsp-security at puck.nether.net
> > https://puck.nether.net/mailman/listinfo/nsp-security
> >
> > Please do not Forward, CC, or BCC this E-mail outside of
> the nsp-security
> > community. Confidentiality is essential for effective
> Internet security counter-measures.
> > _______________________________________________
> >
>
>
More information about the nsp-security
mailing list